Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Infamous /409 issue

    Scheduled Pinned Locked Moved Cache/Proxy
    25 Posts 4 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee
      last edited by JonathanLee

      For bug reporting you can also use . . .

      https://bugs.squid-cache.org/index.cgi

      I have reported some bugs on this and they do respond very quickly.

      I just opened one for host_verify_strict off not working. That should work right?

      https://bugs.squid-cache.org/show_bug.cgi?id=5304

      Make sure to upvote

      V 1 Reply Last reply Reply Quote 0
      • V
        vlurk @JonathanLee
        last edited by

        @JonathanLee said in Infamous /409 issue:

        For bug reporting you can also use . . .

        https://bugs.squid-cache.org/index.cgi

        I have reported some bugs on this and they do respond very quickly.

        I just opened one for host_verify_strict off not working. That should work right?

        https://bugs.squid-cache.org/show_bug.cgi?id=5304

        Actually, I fear that this is the intended behavior. As per documentation:

        	For now suspicious intercepted CONNECT requests are always
        	responded to with an HTTP 409 (Conflict) error page.
        

        My take is that if you run in a transparent mode and the proxy has to fake a CONNECT (applies to HTTPS only), it will always drop the requests that fails the check. Ignoring host_verify_strict off directive.
        Also interesting to note: "for now" makes me believe the DNS check was a band aid to close a security gap, and the author always intended to develop a better solution someday.

        I may be wrong about this though. It is worth validating if it is indeed the intended behavior, as it seems we have different understanding of the documentation.

        1 Reply Last reply Reply Quote 0
        • JonathanLeeJ
          JonathanLee
          last edited by JonathanLee

          Side note:
          I use Squidguard, Squid and Squidlite. My ISP does not provide me with IPv6 so I have it disabled in unbound resolver custom config. I was getting the same errors you have after I disabled IPv6 it stopped. Again I use SSL intercept for some devices and have custom devices set to splice.

          Screenshot_20230926-072153.png
          (Unbound custom options for no IPv6)

          server:
          do-ip4: yes
          prefer-ip4: yes
          do-ip6: no
          prefer-ip6: no
          private-address: ::/0
          dns64-ignore-aaaa: .
          do-not-query-address: ::
          do-not-query-address: ::1
          do-not-query-address: ::/0

          Screenshot_20230926-072505.png
          (Squid set to custom)

          acl splice_only src 192.168.1.7 #Jon Android
          acl splice_only src 192.168.1.8 #Tasha Apple
          acl splice_only src 192.168.1.11 #Amazon Fire
          acl splice_only src 192.168.1.15 #Tasha HP
          acl splice_only src 192.168.1.16 #iPad
          acl splice_only src 192.168.1.18 #Xbox
          acl NoSSLIntercept ssl::server_name_regex -i "/usr/local/pkg/url.nobump" #custom Regex splice url list file

          ssl_bump peek step1 #peek
          ssl_bump splice splice_only #splice devices
          ssl_bump splice NoSSLIntercept #splice only url
          ssl_bump stare all # stare all defaults to bump on step 3

          #Commented out lines
          #acl SSLIntercept ssl::server_name_regex -i "/usr/local/pkg/url.bump" #always bump list
          #ssl_bump bump SSLIntercept

          Make sure to upvote

          V 1 Reply Last reply Reply Quote 0
          • V
            vlurk @JonathanLee
            last edited by

            @JonathanLee
            I saw your other message about force disabling IPv6.

            I gave it a shot. It didn't seem to have much of an impact here. Maybe it did for some DNS records that have IPv6 addresses attached to them. But I have identified tons of DNS records randomly failing with 409 that don't resolve to any IPv6 address, whatsoever.

            This is an issue with short TTLs.
            Consider this DNS record: nav-edge.smartscreen.microsoft.com Edge can randomly query this for SmartScreen. The A record has a 10sec TTL.

            fb453350-6139-4a17-a7b8-353bf1285db1-image.png

            No IPV6 address will be returned for this, ever. Yet, I am logging a few 409 for this destination, from time to time. (until I made sure all traffic toward Azure Cloud would bypass Squid). All it takes is that the web browser tries to establish a connexion to it with a given IP, and when squid attempts the same resolution, it cannot confirm that this IP match the domain in destination.

            Of course, I am making sure that no DNS query can "leak" to the Internet from my clients: NAT rule for UDP port 53, block on outbound 853, and blocklist for known DOH resolvers.

            This is not an IPv6 related issue.

            JonathanLeeJ 1 Reply Last reply Reply Quote 0
            • JonathanLeeJ
              JonathanLee @vlurk
              last edited by

              @vlurk I had some issues for Disney plus, I ended up making an alias for it so that the DNS entry was on hand already.

              Make sure to upvote

              1 Reply Last reply Reply Quote 0
              • JonathanLeeJ
                JonathanLee
                last edited by JonathanLee

                Has anyone attempted this
                http://www.squid-cache.org/Doc/config/dns_nameservers/

                dns_nameservers "pi-hole dns and or dns address of whatever you require"

                Make sure to upvote

                M V 2 Replies Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @JonathanLee
                  last edited by

                  @JonathanLee I haven’t. Are you going to do it?

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • V
                    vlurk @JonathanLee
                    last edited by vlurk

                    @JonathanLee Yes. You can configure this parameter from the GUI:

                    384dd5ef-9b67-4db4-bce7-5e64a8cc267a-image.png

                    This field will set the dns_nameservers config directive in squid.conf.

                    I use 127.0.0.1 (Unbound), and all my clients point to the same DNS server.

                    JonathanLeeJ 1 Reply Last reply Reply Quote 1
                    • JonathanLeeJ
                      JonathanLee @vlurk
                      last edited by JonathanLee

                      @vlurk o yeah that's already in the GUI

                      What about. ..

                      client_persistent_connections on
                      client_persistent_connections off

                      "Squid uses persistent connections (when allowed). You can use
                      this option to disable persistent connections with clients."

                      http://www.squid-cache.org/Doc/config/client_persistent_connections

                      Maybe this could help I must have read every single squid option to find something

                      I also have certificate adaption disabled I leave the certificates as the are and have it set to not check. The other ways had issues for me for some reason.

                      I am just throwing ideas out now for testing. I had no idea squid has so many other configuration options.

                      http://www.squid-cache.org/Doc/config/sslproxy_cert_error/

                      They have a certificate SSL based error conditional statement for ACL use that is domain specific I found.

                      http://www.squid-cache.org/Doc/config/happy_eyeballs_connect_gap/

                      http://www.squid-cache.org/Doc/config/happy_eyeballs_connect_timeout/

                      Maybe...

                      happy_eyeballs_connect_gab ??

                      Or

                      happy_eyeballs_connect_timeout

                      "Happy Eyeballs is an algorithm published by the IETF that makes dual-stack applications more responsive to users by attempting to connect using both IPv4 and IPv6 at the same time, thus minimizing common problems experienced by users with imperfect IPv6 connections or setups."

                      Make sure to upvote

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @JonathanLee
                        last edited by

                        @JonathanLee

                        Updating this thread for everyone..

                        Uninstall Squid Proxy. As i long suspected by the lack of movement in any of the redmines, Netgate has decided to deprecate Squid Proxy.
                        I consider this a really good thing.....

                        But if there is a need to MITM something i dont know of any open source alternatives other than looking at other security vendor firewalls which have custom but supported proxy configuration

                        https://www.netgate.com/blog/deprecation-of-squid-add-on-package-for-pfsense-software

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        JonathanLeeJ 1 Reply Last reply Reply Quote 0
                        • JonathanLeeJ
                          JonathanLee @michmoor
                          last edited by JonathanLee

                          @michmoor Like Lightbeam, and many other tools that worked very well it seems soon after you can no longer use them.

                          I wonder what alternatives there are ?

                          I for one will stay with 23.09 just to use Squid. Dang :( It's sad I spent years getting this to actually work.

                          Make sure to upvote

                          1 Reply Last reply Reply Quote 0
                          • JonathanLeeJ
                            JonathanLee
                            last edited by JonathanLee

                            What is the next official Netgate product that will continue to support a proxy with SSL intercept that can be purchased? Now that this is being twightlighted?

                            What version should I upgrade too for proxy cacheing abilities? I have a SG-2100 currently. Should users move to Palo Alto?

                            Make sure to upvote

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.